Security enhancement in In-vehicle Controller Area Networks by Electronic Control Unit authentication

被引:0
|
作者
Lakshmanan, Murugesan [1 ]
Natarajan, Senthil Kumar [2 ]
机构
[1] Arasan Ganesan Polytech Coll, Elect & Commun Engn, Sivakasi, India
[2] Mepco Schlenk Engn Coll, Elect & Elect Engn, Sivakasi, India
关键词
Authentication; Security; Electronic Control Unit; Encryption; In-vehicle network; Controller Area Network; International Data Encryption Algorithm;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Controller Area Network (CAN), the most popular network of Electronic Control Units (ECUs) was designed by Bosch in 1990s to prioritize reliability and safety but with absence of security. An attacker can take control of the ECUs and probably harm the safety critical operations inside the vehicle. Hence, security especially ECU authentication is most important for CAN. In this paper, an ECU authentication scheme named Security Enhancement using Truncated Message Authentication Code (SETMAC) for CAN is proposed. The authentication code generated using International Data Encryption Algorithm (IDEA) is truncated to four bytes to accommodate the message data into the maximum payload size of eight bytes. 8-bit message counter is incorporated among the ECUs to provide opposition to replay attacks. The proposed algorithm avoids the need of an extra frame for sending authentication messages and thus effectively reduces the bus load. The algorithm is tested with CANoe software using the CAN data set captured from a real vehicle. The simulation results show that the proposed authentication algorithm can be implemented in existing real time CAN bus networks in 500kb/s and 1Mb/s bit rates at maximum busloads of 25.05% and 12.52% respectively.
引用
收藏
页码:228 / 243
页数:16
相关论文
共 50 条
  • [11] Designing security for in-vehicle networks: a Body Control Module (BCM) centered viewpoint
    Groza, Bogdan
    Gurban, Horatiu-Eugen
    Murvay, Pal-Stefan
    2016 46TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W), 2016, : 176 - 183
  • [12] Intrusion Detection Method Using Bi-Directional GPT for in-Vehicle Controller Area Networks
    Nam, Minki
    Park, Seungyoung
    Kim, Duk Soo
    IEEE ACCESS, 2021, 9 : 124931 - 124944
  • [13] A Semi-centralized Security Framework for In-Vehicle Networks
    Roca, Ivan Edmar Carvajal
    Wang, Jian
    Du, Jun
    Weit, Shuangqing
    2020 16TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE, IWCMC, 2020, : 1 - 6
  • [14] An Analysis Platform for the Information Security of In-Vehicle Networks Connected with External Networks
    Ezaki, Takaya
    Date, Tomohiro
    Inoue, Hiroyuki
    ADVANCES IN INFORMATION AND COMPUTER SECURITY (IWSEC 2015), 2015, 9241 : 301 - 315
  • [15] Security Enhancement for Real-Time Independent In-Vehicle CAN-FD Messages in Vehicular Networks
    Xie, Guoqi
    Yang, Laurence T.
    Liu, Yao
    Luo, Haibo
    Peng, Xin
    Li, Renfa
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2021, 70 (06) : 5244 - 5253
  • [16] An Authentication and Secure Communication Scheme for In-Vehicle Networks Based on SOME/IP
    Ma, Bin
    Yang, Shichun
    Zuo, Zheng
    Zou, Bosong
    Cao, Yaoguang
    Yan, Xiaoyu
    Zhou, Sida
    Li, Jichong
    SENSORS, 2022, 22 (02)
  • [17] LaaCan: A Lightweight Authentication Architecture for Vehicle Controller Area Network
    Hridoy, Syed Akib Anwar
    Zulkernine, Mohammad
    SECURITY AND PRIVACY IN COMMUNICATION NETWORKS (SECURECOMM 2020), PT II, 2020, 336 : 215 - 234
  • [18] Security Issues with In-Vehicle Networks, and Enhanced Countermeasures Based on Blockchain
    Khatri, Narayan
    Shrestha, Rakesh
    Nam, Seung Yeob
    ELECTRONICS, 2021, 10 (08)
  • [19] Design of a FlexRay/Ethernet Gateway and Security Mechanism for In-Vehicle Networks
    Lee, Trong-Yen
    Lin, I-An
    Liao, Ren-Hong
    SENSORS, 2020, 20 (03)
  • [20] HIGHER LAYER AUTHENTICATION FOR BROADCAST IN CONTROLLER AREA NETWORKS
    Groza, Bogdan
    Murvay, Pal-Stefan
    SECRYPT 2011: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2011, : 188 - 197